lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8007.1208549670@turing-police.cc.vt.edu>
Date:	Fri, 18 Apr 2008 16:14:30 -0400
From:	Valdis.Kletnieks@...edu
To:	Andrew Morton <akpm@...ux-foundation.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: 2.6.25-mm1

On Fri, 18 Apr 2008 01:47:57 PDT, Andrew Morton said:
> ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.25/2.6.25-mm1/

I may have reported this same one previously against an earlier -mm, or somebody
did, or something... ;)

x86_64 kernel, Core2 Duo T7200, Dell Latitude D820 laptop...

[    0.060388] ACPI: Core revision 20080321
[    0.070079] ------------[ cut here ]------------
[    0.070082] WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x41/0x7c()
[    0.070085] Modules linked in:
[    0.070089] Pid: 1, comm: swapper Not tainted 2.6.25-mm1 #1
[    0.070091]
[    0.070092] Call Trace:
[    0.070099]  [<ffffffff8023c702>] warn_on_slowpath+0x67/0xb7
[    0.070105]  [<ffffffff805d096e>] ? _spin_lock+0x25/0x54
[    0.070111]  [<ffffffff8021e399>] ? __cpus_weight+0x4b/0x68
[    0.070114]  [<ffffffff802245c1>] read_apic_id+0x41/0x7c
[    0.070119]  [<ffffffff807a0ded>] verify_local_APIC+0xb4/0x177
[    0.070123]  [<ffffffff805d4153>] ? sub_preempt_count+0x44/0x6e
[    0.070126]  [<ffffffff8079faf4>] native_smp_prepare_cpus+0x238/0x36a
[    0.070129]  [<ffffffff805d4153>] ? sub_preempt_count+0x44/0x6e
[    0.070134]  [<ffffffff80794712>] kernel_init+0x69/0x2a1
[    0.070137]  [<ffffffff805d0d42>] ? _spin_unlock_irq+0x43/0x62
[    0.070143]  [<ffffffff802366b7>] ? finish_task_switch+0x3e/0xb4
[    0.070147]  [<ffffffff8020d6e8>] child_rip+0xa/0x12
[    0.070150]  [<ffffffff8020cdd0>] ? restore_args+0x0/0x30
[    0.070154]  [<ffffffff807946a9>] ? kernel_init+0x0/0x2a1
[    0.070157]  [<ffffffff8020d6de>] ? child_rip+0x0/0x12
[    0.070159]
[    0.070166] ---[ end trace a7919e7f17c0a725 ]---
[    0.070169] ------------[ cut here ]------------
[    0.070171] WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x41/0x7c()
[    0.070174] Modules linked in:
[    0.070177] Pid: 1, comm: swapper Tainted: G        W 2.6.25-mm1 #1
[    0.070179]
[    0.070179] Call Trace:
[    0.070182]  [<ffffffff8023c702>] warn_on_slowpath+0x67/0xb7
[    0.070186]  [<ffffffff805d096e>] ? _spin_lock+0x25/0x54
[    0.070189]  [<ffffffff8021e399>] ? __cpus_weight+0x4b/0x68
[    0.070192]  [<ffffffff802245c1>] read_apic_id+0x41/0x7c
[    0.070195]  [<ffffffff807a0e1f>] verify_local_APIC+0xe6/0x177
[    0.070199]  [<ffffffff805d4153>] ? sub_preempt_count+0x44/0x6e
[    0.070202]  [<ffffffff8079faf4>] native_smp_prepare_cpus+0x238/0x36a
[    0.070205]  [<ffffffff805d4153>] ? sub_preempt_count+0x44/0x6e
[    0.070209]  [<ffffffff80794712>] kernel_init+0x69/0x2a1
[    0.070212]  [<ffffffff805d0d42>] ? _spin_unlock_irq+0x43/0x62
[    0.070215]  [<ffffffff802366b7>] ? finish_task_switch+0x3e/0xb4
[    0.070218]  [<ffffffff8020d6e8>] child_rip+0xa/0x12
[    0.070221]  [<ffffffff8020cdd0>] ? restore_args+0x0/0x30
[    0.070225]  [<ffffffff807946a9>] ? kernel_init+0x0/0x2a1
[    0.070228]  [<ffffffff8020d6de>] ? child_rip+0x0/0x12
[    0.070230]
[    0.070231] ---[ end trace a7919e7f17c0a725 ]---
[    0.081710] CPU0: Intel(R) Core(TM)2 CPU         T7200  @ 2.00GHz stepping 06

Other than that, it's lived for an hour without barfing yet, but I won't
have a chance to kick the tires and try stupid sysadmin tricks like I usually
do until Sunday-ish... Have a good weekend...

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ